A Framework for Generating Network-Based Moving Objects
Geoinformatica
Protecting Respondents' Identities in Microdata Release
IEEE Transactions on Knowledge and Data Engineering
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Protecting Location Privacy Through Path Confusion
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
The new Casper: query processing for location services without compromising privacy
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
A peer-to-peer spatial cloaking algorithm for anonymous location-based service
GIS '06 Proceedings of the 14th annual ACM international symposium on Advances in geographic information systems
Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
Proceedings of the 1st international conference on Mobile systems, applications and services
L-diversity: Privacy beyond k-anonymity
ACM Transactions on Knowledge Discovery from Data (TKDD)
PRIVE: anonymous location-based queries in distributed mobile systems
Proceedings of the 16th international conference on World Wide Web
Preserving privacy in gps traces via uncertainty-aware path cloaking
Proceedings of the 14th ACM conference on Computer and communications security
Location anonymity in continuous location-based services
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Private queries in location based services: anonymizers are not necessary
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Virtual trip lines for distributed privacy-preserving traffic monitoring
Proceedings of the 6th international conference on Mobile systems, applications, and services
Proceedings of the 6th international conference on Mobile systems, applications, and services
Anonysense: privacy-aware people-centric sensing
Proceedings of the 6th international conference on Mobile systems, applications, and services
An Improved V-MDAV Algorithm for l-Diversity
ISIP '08 Proceedings of the 2008 International Symposiums on Information Processing
A network aware privacy model for online requests in trajectory data
Data & Knowledge Engineering
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
MOBIHIDE: a mobilea peer-to-peer system for anonymous location-based queries
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Enabling private continuous queries for revealed user locations
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Protecting privacy against location-based personal identification
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
On the anonymity of periodic location samples
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Preserving user location privacy in mobile data management infrastructures
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
The quest for personal control over mobile location privacy
IEEE Communications Magazine
The PROBE Framework for the Personalized Cloaking of Private Locations
Transactions on Data Privacy
Empirical models of privacy in location sharing
Proceedings of the 12th ACM international conference on Ubiquitous computing
Unraveling an old cloak: k-anonymity for location privacy
Proceedings of the 9th annual ACM workshop on Privacy in the electronic society
Time warp: how time affects privacy in LBSs
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Third party geolocation services in LBS: privacy requirements and research issues
Transactions on Data Privacy
Protecting location privacy using location semantics
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Measuring query privacy in location-based services
Proceedings of the second ACM conference on Data and Application Security and Privacy
A hybrid approach for privacy-preserving processing of knn queries in mobile database systems
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Protecting query privacy in location-based services
Geoinformatica
Hi-index | 0.00 |
Anonymous location information may be correlated with restricted spaces such as home and office for subject re-identification. This makes it a great challenge to provide location privacy protection for users of location-based services. Existing work adopts traditional K-anonymity model and ensures that each location disclosed in service requests is a spatial region that has been visited by at least K users. This strategy requires a user to specify an appropriate value of K in order to achieve a desired level of privacy protection. This is problematic because privacy is about feeling, and it is awkward for one to scale her feeling using a number. In this paper, we propose a feeling-based privacy model. The model allows a user to express her privacy requirement by specifying a public region, which the user would feel comfortable if the region is reported as her location. The popularity of the public region, measured using entropy based on its visitors' footprints inside it, is then used as the user's desired level of privacy protection. With this model in place, we present a novel technique that allows a user's location information to be reported as accurate as possible while providing her sufficient location privacy protection. The new technique supports trajectory cloaking and can be used in application scenarios where a user needs to make frequent location updates along a trajectory that cannot be predicted. In addition to evaluating the effectiveness of the proposed technique under various conditions through simulation, we have also implemented an experimental system for location privacy-aware uses of location-based services.